Integrate Hacking Technique into Information Assurance Education

被引:3
|
作者
Yang, Jianhua [1 ]
Wang, Yien [1 ]
Reddington, Thomas [2 ]
机构
[1] Columbus State Univ, TSYS Sch Comp Sci, Columbus, GA 31907 USA
[2] NYU, Polytech Sch Engn, MetroTech Ctr 6, Brooklyn, NY 11201 USA
来源
IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA 2016) | 2016年
关键词
Network mapping; vulnerability scanning; host exploitation; post exploitation; cybersecurity;
D O I
10.1109/WAINA.2016.164
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
It has become a trend that more and more institutions offer offensive techniques in information assurance education. In this paper, up the discussion of network mapping and vulnerability scanning, gaining access to a target via vulnerability exploitation, and maintaining an access to a victim host through HackerDefender rootkit techniques, we propose integrating the hacking techniques into information security education. Five hands-on lab exercises are proposed and the platform iVLab to conduct the labs are also presented.
引用
收藏
页码:381 / 387
页数:7
相关论文
共 50 条
  • [31] INTEGRATE STRATEGY AND INFORMATION TECHNOLOGY
    KREBS, V
    PERSONNEL JOURNAL, 1988, 67 (11) : 93 - &
  • [32] Hacking Competitions and Their Untapped Potential for Security Education
    Conti, Gregory
    Babbbbitt, Thomas
    Nelson, John
    IEEE SECURITY & PRIVACY, 2011, 9 (03) : 56 - 59
  • [33] CLUSTER SYSTEMS INTEGRATE INFORMATION
    WALSHE, WA
    WORD PROCESSING & INFORMATION SYSTEMS, 1982, 9 (10): : 26 - 31
  • [34] How Children integrate Information
    不详
    SPRACHE-STIMME-GEHOR, 2022, 46 (01): : 10 - 10
  • [35] Hacking for fun and Education: ELearning on Network Security
    Ott, Alexander
    Sethmann, Richard
    PROCEEDINGS OF THE 9TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 229 - 237
  • [36] Software Startup Education: Gamifying Growth Hacking
    Kemell, Kai-Kristian
    Feshchenko, Polina
    Himmanen, Joonas
    Hossain, Abrar
    Jameel, Furgan
    Puca, Raffaele Luigi
    Vitikainen, Teemu
    Kultanen, Joni
    Risku, Juhani
    Impio, Johannes
    Sorvisto, Anssi
    Abrahamsson, Pekka
    PROCEEDINGS OF THE 2ND ACM SIGSOFT INTERNATIONAL WORKSHOP ON SOFTWARE-INTENSIVE BUSINESS: START-UPS, PLATFORMS, AND ECOSYSTEMS (IWSIB '19), 2019, : 25 - 30
  • [37] Hacking Higher Education: Rethinking the EduHack Course
    Barpi, Fabrizio
    Dalmazzo, Davide
    De Blasio, Antonella
    Vinci, Fiorella
    EDUCATION SCIENCES, 2021, 11 (02): : 1 - 11
  • [38] Pracademic collaboration: Hacking into the future of legal education
    Kessel, Rachel
    ALTERNATIVE LAW JOURNAL, 2019, 44 (01) : 73 - 75
  • [39] HOW TO INTEGRATE ICT INTO THE EDUCATION?
    Reveszova, Libusa
    INFORMATION AND COMMUNICATION TECHNOLOGY IN EDUCATION, 2012, : 219 - 228
  • [40] Quality assurance as a driver of information management strategy Stakeholders' perspectives in higher education
    Mourad, Maha
    JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT, 2017, 30 (05) : 779 - 794